Tue.Jul 24, 2018

article thumbnail

Head of Hacked Bitcoin Exchange Pleads Guilty to US Charges

Data Breach Today

After Theft of 6,000 Bitcoins, Joe Montrose Obstructed FBI's Investigation Jon Montroll, the former operator of a bitcoin exchange that was hacked, leading to the theft of 6,000 bitcoins, has pleaded guilty to charges that he obstructed federal investigators and deceived investors by attempting to cover up the losses.

154
154
article thumbnail

GDPR Compliance Obligations: The relationship between Data Controllers and Third-Party Processors

AIIM

This is the 11th post in a series on privacy by Andrew Pery. You might also be interested in: The Re-Permissioning Dilemma Under GDPR. Data Privacy and Open Data: Secondary Uses under GDPR. Three Critical Steps for GDPR Compliance. Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. GDPR and Cross Border Data Flows between the EU and the US: Current State of the Law.

GDPR 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

'Haven't We Solved the Insider Threat?'

Data Breach Today

Researcher Randy Trzeciak on Why Insiders Remain Major Risks to Enterprises Randy Trzeciak, director of the CERT Insider Threat Center at Carnegie Mellon University, says he is frequently asked: "Haven't we solved the insider threat problem?" Far from it, he responds. And in fact, he is helping many organizations stand up insider threat defense programs.

Risk 124
article thumbnail

Police can access My Health Record without court order, parliamentary library warns

The Guardian Data Protection

Advice from independent researcher contradicts health minister and raises more privacy concerns The health minister, Greg Hunt, was wrong to claim that patients’ My Health Record could only be accessed by police with a court order, according to advice from the parliamentary library. The parliamentary library has warned the law governing MyHealth Records represents a “significant reduction” in safeguards on police getting medical records because the operator cannot routinely require them to get a

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ransomware: Why Rapid Detection Is So Critical

Data Breach Today

Recent ransomware attacks against healthcare organizations and others demonstrate why rapid detection is critical to limiting the malware's damage, says cybersecurity expert Bill Dixon of Kroll.

More Trending

article thumbnail

Video Interview: Know Your (Digital) Customer

Data Breach Today

IBM's Shaked Vax on Validating Digital Identities with Physical Identities to Protect Accounts In the wake of so many mega-breaches, new account fraud is easier to perpetrate than account takeovers. This puts new pressure on enterprises to know their digital customers, as well as to authenticate their identities and activities, says Shaked Vax of IBM Security.

article thumbnail

Prepare for a healthcare data breach this summer

IT Governance

The summer heatwave is in full swing. You’ll no doubt be taking measures to protect yourself against sunburn, but don’t forget that your organisation needs to apply its own SPF (security protection factor) to protect itself from data breach damage. Data breaches can occur at any time, but organisations are particularly vulnerable during the summer holidays, when cyber criminals take advantage of lower staffing levels to launch malicious attacks.

article thumbnail

The Best of Infosecurity Europe 2018

Data Breach Today

A Guide to Video Interviews With Thought Leaders at This Year's Event At Infosecurity Europe 2018, Information Security Media Group conducted dozens of video interviews with industry thought leaders. Here are the highlights.

article thumbnail

Leveraging Machine Translation Technology for Multi-Lingual Arbitrations

eDiscovery Law

Arbitration matters, and the teams working on them, can often span geographic borders which in turn can present a number of logistical issues.

Paper 69
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Expert guidance for implementing an ISMS

IT Governance

An ISMS (information security management system) should be an essential part of any organisation’s information security practices. It consists of a set of policies, procedures and controls that manage threats to your data, such as cyber attacks, hacks, data leaks or theft. It can be applied to the entire organisation or a specific area or department.

article thumbnail

CIPL Issues Discussion Papers on the Central Role of Accountability in Data Protection

Hunton Privacy

On July 23, 2018, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP issued two new discussion papers on the Central Role of Organizational Accountability in Data Protection. The goal of these discussion papers is to show that organizational accountability is pivotal to effective data protection and essential for the digital transformation of the economy and society, and to emphasize how its many benefits should be actively encouraged and incentivized by data prote

Paper 56
article thumbnail

Russian Hackers Infiltrate U.S. Electrical Utilities: Report

Adam Levin

Russian hackers have successfully infiltrated the control system rooms of U.S. electrical utilities, the Department of Homeland Security announced earlier this week. Suspected hacking groups Dragonfly and Energetic Bear infiltrated their targets using common methods including spear-phishing and watering-hole attacks. They first targeted third-party vendors associated with the utilities, which they then leveraged to steal credentials and gain access to operating systems.

article thumbnail

Nicholas Weaver on Cryptocurrencies

Schneier on Security

This is well-worth reading (non-paywalled version ). Here's the opening: Cryptocurrencies, although a seemingly interesting idea, are simply not fit for purpose. They do not work as currencies, they are grossly inefficient, and they are not meaningfully distributed in terms of trust. Risks involving cryptocurrencies occur in four major areas: technical risks to participants, economic risks to participants, systemic risks to the cryptocurrency ecosystem, and societal risks.

Risk 54
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Federal Agency Data is Under Siege

Thales Cloud Protection & Licensing

Originally Featured in Global Military Communications Magazine’s June/July Issue. With more than 65,000 employees in 56 countries, Thales is a global leader in technology solutions for the aerospace, transport, defence and security markets. Its unique capabilities include the design and deployment of equipment, systems and services to meet complex security requirements.

article thumbnail

DHS – Russian APT groups are inside US critical infrastructure

Security Affairs

The US Government is warning of continuous intrusions in National critical infrastructure and it is blaming the Kremlin for the cyber attacks. According to the US Department of Homeland Security, Russia’s APT groups have already penetrated America’s critical infrastructure, especially power utilities, and are still targeting them. These attacks could have dramatic consequence, an attack against a power grid could cause a massive power outage.

Paper 52
article thumbnail

Google Chrome Now Labels HTTP Sites as 'Not Secure'

WIRED Threat Level

The world's biggest browser now lets you know when you're visiting an unencrypted site.

article thumbnail

Android Debugging Tools Also Useful for Compromising Devices, Mining Cryptocurrency

Security Affairs

It is common for developers to use debugging tools with elevated privileges while they are trying to troubleshoot their code. But crooks can abuse them too. In an ideal world, all of the security controls are applied and all of the debugging tools are removed or disabled before the code is released to the public. In reality, devices are sometimes released in a vulnerable state without the end users’ knowledge.

Mining 46
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Free SANS Webinar: I Before R Except After IOC

Andrew Hay

Join Andrew Hay on Wednesday, July 25th, 2018 at 10:30 AM EDT (14:30:00 UTC) for an exciting free SANS Institute Webinar entitled “I” Before “R” Except After IOC. Using actual investigations and research, this session will help attendees better understand the true value of an individual IOC, how to quantify and utilize your collected indicators, and what constitutes an actual incident.

article thumbnail

Threat Hunting: Rethinking 'Needle in a Haystack' Security Defenses

Dark Reading

In cyber, needles (that is, threats) can disappear quickly, for a variety of reasons, and long often after hackers have completed what they came to do.

article thumbnail

Apache Software Foundation fixes important flaws in Apache Tomcat

Security Affairs

The Apache Software Foundation has rolled out security updates for the Tomcat application server that address several flaws. The Apache Software Foundation has released security updates for the Tomcat application server that address several vulnerabilities, including issues that trigger a denial-of-service (DoS) condition or can lead to information disclosure.

article thumbnail

Three Fundamental Digital Preservation Strategies

IG Guru

July 9, 2018 by Margot Note, CA, CRM Digital files exist simply as data until they are rendered by application software, operating systems, and hardware platforms—making them vulnerable to format obsolescence and media decay. Unlike physical materials, digital files cannot survive what we call “benign neglect”. As a consultant, I work with collections of paper […].

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

New Report Shows Pen Testers Usually Win

Dark Reading

Pen testers are successful most of the time, and it's not all about stolen credentials, according to a new report based on hundreds of tests.

IT 47
article thumbnail

Half the US population will live in 8 states

Adam Shostack

That’s the subject of a thought-provoking Washington Post article, “ In about 20 years, half the population will live in eight states ,” and 70% of Americans will live in 15 states. “ Meaning 30 percent will choose 70 senators. And the 30% will be older, whiter, more rural, more male than the 70 percent. ” Of course, as the census shows the population shifting, the makeup of the House will also change dramatically.

IT 40
article thumbnail

7 Ways to Better Secure Electronic Health Records

Dark Reading

Healthcare data is prime targets for hackers. What can healthcare organizations do to better protect all of that sensitive information?

article thumbnail

Hanzo and Zapproved Partner to Modernize How Corporations Manage eDiscovery

Hanzo Learning Center

New York, NY, July 24, 2018 -- Hanzo, a pioneer of contextual collection and dynamic web content software, and Zapproved, the leading ediscovery software provider for managing corporate litigation readiness, today announced a partnership to increase the connectivity and simplicity of the ediscovery lifecycle.

40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

DHS Officials: Hundreds of US Utility Victims Infiltrated by Russian Hackers

Dark Reading

Federal government officials up their count of US energy sector victims from dozens to hundreds, according to a Wall Street Journal report.

article thumbnail

Google Starts Labeling All HTTP Sites as ‘Not Secure’

Threatpost

Any Chrome user visiting an HTTP website will see an impossible-not-to-notice warning label that the site is "not secure.".

article thumbnail

How 'Projection' Slows Down the Path to Security Maturity

Dark Reading

A little bit of self-awareness goes a long way when it comes to evaluating a company's security maturity level. It's also a prerequisite to improving.